11.2 Flashcards
Firewall might be placed internally residing between two interconnected private networks. More commonly firewalls placed on the edge of a private networking monitoring the connection between a private net work at a public network this is an example of – – – –
Network-based firewall
– – – – – – Software protects the computer on which it’s installed. These firewalls can be configured more specifically for each Cerner or workstation where is network firewalls must be configured for all the traffic allowed on the net work
Host based firewall
The simplest form of the firewall is a – – – – – – which is in network device where application that examines the header of every packet of data it receives on any of its interfaces
Packet filtering firewall
The firewall refers to a ———— to determine whether the type of packet is authorized to continue to watch destinations regardless of whether the destination is on an internal lamb or external net work
ACL
Often find will ship with the default configuration design Block the most common types of ————
Security threats
A – – – – Can inspect each incoming packet for determine whether it belongs to a currently active connection
Stateful firewall
a – – – – – – Manages each incoming packet as a standalone entity without regard to currently active connections these are faster than stateless firewalls but are not as sophisticated
Stateless firewall
This firewall Can block designated types of traffic based on application data contained within packets
Application layer firewall
A————wireless router typically access the firewall and includes packet filtering options.
Soho
An ACL on a router can ———- traffic according to its IP address or port number and can be used to scold traffic flows according to internal network means
Filter
– – – – Function on a single interface at a time, or an intended to manage a long list of rules, and can’t match rules to multiple streams of traffic with a single conversation
ACL
This is a standalone device and application with built-in feature running on the workstation server switch router or firewall in monitors network traffic, generates alerts about suspicious activity
IDS intrusion detection system
Where as an ACL acts like a bouncer at a club the —— ask to make sure that only club mentors enter through the door
Ids
This compares network traffic samples to a predetermined baseline to detect anomalies beyond certain parameters
Statistical anomaly detection
Looks for identifiable patterns or signatures of a code that are known to indicate specific vulnerabilities exploits or other undesirable traffic on the organizations Netwerk
Signature base detection